Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1010
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Nakahara Jr., Jorge. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:24:23Z | - |
dc.date.available | 2020-05-17T08:24:23Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319682730 ; | en_US |
dc.identifier.isbn | 9783319682723 (print) ; | en_US |
dc.identifier.isbn | 9783319682747 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1010 | - |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | 005.74 ; 23 ; | en_US |
dc.description | Printed edition: ; 9783319682723. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319682747. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs. The appendices include surveys of cryptographic substitution boxes and of MDS codes. This comprehensive treatment can serve as a reference source for researchers, students and practitioners. ; | en_US |
dc.description.statementofresponsibility | by Jorge Nakahara Jr. | en_US |
dc.description.tableofcontents | Introduction -- Lai-Massey Block Ciphers -- Attacks -- New Cipher Designs -- Conclusions -- App. A, Monoids, Groups, Rings and Fields -- App. B, Differential and Linear Branch Number -- App. C, Substitution Boxes (S-boxes) -- Index. ; | en_US |
dc.format.extent | XVII, 726 p. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.haspart | 9783319682723.pdf | en_US |
dc.subject | Data structures (Computer scienc. ; | en_US |
dc.subject | Data protection. ; | en_US |
dc.subject | Number theory. ; | en_US |
dc.subject | Computational complexity. ; | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; http://scigraph.springernature.com/things/product-market-codes/I15009. ; | en_US |
dc.subject | Systems and Data Security. ; http://scigraph.springernature.com/things/product-market-codes/I14050. ; | en_US |
dc.subject | Number Theory. ; http://scigraph.springernature.com/things/product-market-codes/M25001. ; | en_US |
dc.subject | Discrete Mathematics in Computer Science. ; http://scigraph.springernature.com/things/product-market-codes/I17028. ; | en_US |
dc.subject.lcc | QA76.9.D35 ; | en_US |
dc.title | Lai-Massey Cipher Designs | en_US |
dc.title.alternative | History, Design Criteria and Cryptanalysis / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319682723.pdf | 7.92 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Nakahara Jr., Jorge. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:24:23Z | - |
dc.date.available | 2020-05-17T08:24:23Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319682730 ; | en_US |
dc.identifier.isbn | 9783319682723 (print) ; | en_US |
dc.identifier.isbn | 9783319682747 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1010 | - |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | 005.74 ; 23 ; | en_US |
dc.description | Printed edition: ; 9783319682723. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319682747. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs. The appendices include surveys of cryptographic substitution boxes and of MDS codes. This comprehensive treatment can serve as a reference source for researchers, students and practitioners. ; | en_US |
dc.description.statementofresponsibility | by Jorge Nakahara Jr. | en_US |
dc.description.tableofcontents | Introduction -- Lai-Massey Block Ciphers -- Attacks -- New Cipher Designs -- Conclusions -- App. A, Monoids, Groups, Rings and Fields -- App. B, Differential and Linear Branch Number -- App. C, Substitution Boxes (S-boxes) -- Index. ; | en_US |
dc.format.extent | XVII, 726 p. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.haspart | 9783319682723.pdf | en_US |
dc.subject | Data structures (Computer scienc. ; | en_US |
dc.subject | Data protection. ; | en_US |
dc.subject | Number theory. ; | en_US |
dc.subject | Computational complexity. ; | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; http://scigraph.springernature.com/things/product-market-codes/I15009. ; | en_US |
dc.subject | Systems and Data Security. ; http://scigraph.springernature.com/things/product-market-codes/I14050. ; | en_US |
dc.subject | Number Theory. ; http://scigraph.springernature.com/things/product-market-codes/M25001. ; | en_US |
dc.subject | Discrete Mathematics in Computer Science. ; http://scigraph.springernature.com/things/product-market-codes/I17028. ; | en_US |
dc.subject.lcc | QA76.9.D35 ; | en_US |
dc.title | Lai-Massey Cipher Designs | en_US |
dc.title.alternative | History, Design Criteria and Cryptanalysis / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319682723.pdf | 7.92 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Nakahara Jr., Jorge. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:24:23Z | - |
dc.date.available | 2020-05-17T08:24:23Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9783319682730 ; | en_US |
dc.identifier.isbn | 9783319682723 (print) ; | en_US |
dc.identifier.isbn | 9783319682747 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1010 | - |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | 005.74 ; 23 ; | en_US |
dc.description | Printed edition: ; 9783319682723. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | Printed edition: ; 9783319682747. ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs. The appendices include surveys of cryptographic substitution boxes and of MDS codes. This comprehensive treatment can serve as a reference source for researchers, students and practitioners. ; | en_US |
dc.description.statementofresponsibility | by Jorge Nakahara Jr. | en_US |
dc.description.tableofcontents | Introduction -- Lai-Massey Block Ciphers -- Attacks -- New Cipher Designs -- Conclusions -- App. A, Monoids, Groups, Rings and Fields -- App. B, Differential and Linear Branch Number -- App. C, Substitution Boxes (S-boxes) -- Index. ; | en_US |
dc.format.extent | XVII, 726 p. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.haspart | 9783319682723.pdf | en_US |
dc.subject | Data structures (Computer scienc. ; | en_US |
dc.subject | Data protection. ; | en_US |
dc.subject | Number theory. ; | en_US |
dc.subject | Computational complexity. ; | en_US |
dc.subject | Data Structures, Cryptology and Information Theory. ; http://scigraph.springernature.com/things/product-market-codes/I15009. ; | en_US |
dc.subject | Systems and Data Security. ; http://scigraph.springernature.com/things/product-market-codes/I14050. ; | en_US |
dc.subject | Number Theory. ; http://scigraph.springernature.com/things/product-market-codes/M25001. ; | en_US |
dc.subject | Discrete Mathematics in Computer Science. ; http://scigraph.springernature.com/things/product-market-codes/I17028. ; | en_US |
dc.subject.lcc | QA76.9.D35 ; | en_US |
dc.title | Lai-Massey Cipher Designs | en_US |
dc.title.alternative | History, Design Criteria and Cryptanalysis / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319682723.pdf | 7.92 MB | Adobe PDF | Preview File |